Proceedings of the 15th IEEE/ACM International Symposium on Networks-on-Chip 2021
DOI: 10.1145/3479876.3481592
|View full text |Cite
|
Sign up to set email alerts
|

Securing network-on-chips via novel anonymous routing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…An intelligent attacker can use these gathered data to launch complex cryptanalysis attacks. Sarihi et al [67] use a similar threat model to [24]. Furthermore, they highlight the fact that header information needs to be kept in plain-text in order for a router to process the request fast without per hop costly decryption.…”
Section: Anonymitymentioning
confidence: 99%
See 1 more Smart Citation
“…An intelligent attacker can use these gathered data to launch complex cryptanalysis attacks. Sarihi et al [67] use a similar threat model to [24]. Furthermore, they highlight the fact that header information needs to be kept in plain-text in order for a router to process the request fast without per hop costly decryption.…”
Section: Anonymitymentioning
confidence: 99%
“…The proposed anonymous routing ensures anonymity with only 4% impact on performance while traditional onion routing implementation introduces 1.5X performance degradation. Sarihi et al [67] propose an anonymous routing mechanism in NoC. This routing mechanism uses encrypted destination address and prevent any malicious router in the middle collecting the packets of same flow.…”
Section: Anonymitymentioning
confidence: 99%
“…Pre-computeation of path routing; encryption of destination address [43] Tailored to XY routing limiting their adaptability.…”
Section: Sensitive Data Extractionmentioning
confidence: 99%
“…A malicious node may sniff this information from the headers to launch various attacks. The work in [43] proposes a novel routing mechanism in which secure packets traverse through a precomputed path. The destination address is encrypted so that it remains anonymous for the router.…”
Section: Sensitive Data Extractionmentioning
confidence: 99%
“…MCSoCs are susceptible to various attacks, such as hardware Trojans (HT), side channel attacks (SCA), denial of service (DoS), and spoofing [6]. Current security methods in MCSoCs include the implementation of firewalls [7], secure routing algorithms [8], encryption [9], authentication [10], anomaly detection [11], among others. These proposals focus on mitigating a single type of attack rather than seeking to create an integrated security framework.…”
Section: Introductionmentioning
confidence: 99%